Updated 5/29/2012 - The virus that keeps on giving

On the first matrix below, STUXNET is the axis term. The matrix includes key a-prior terms VIRUS, IRAN, COMPUTER, (5)771 (2010: when the virus hit) ELECTRIC, ATOM; and the a-posteriori term SECRET ARTS which is appropriate for an act of military sabotage. The SECRET ARTS term crosses and shares a letter with STUXNET. IRAN also crosses and shares a letter with STUXNET. An updated story about how the STUXNET VIRUS is crippling Iran's nuclerar program is offered below the matrix.

On the second matrix, the same ELS of STUXNET is the axis term. The a priori key words are ISRAEL and IRAN. The terms THE WATERand ON THE FIRE are a posteriori. It looks like Israel's STUXNET virus has done a good job of pouring water on Iran's nuclear fire. There was about 1 chance in 10 to have an open text reference to ISRAEL and at an ELS of IRAN on the 198-letter matrix.

Iran's Nuclear Program Suffers Major Setback

Published February 26, 2011 (Associated Press)

AP

In this Saturday, Aug. 21, 2010, file photo, the reactor building of the Bushehr nuclear power plant is seen, outside the southern city of Bushehr, Iran.

TEHRAN, Iran -- In a major setback to Iran's nuclear program, technicians will have to unload fuel from the country's first atomic power plant because of an unspecified safety concern, a senior government official said.

The vague explanation raised questions about whether the mysterious computer worm known as Stuxnet might have caused more damage at the Bushehr plant than previously acknowledged. Other explanations are possible for unloading the fuel rods from the reactor core of the newly completed plant, including routine technical difficulties.

While the exact reason behind the fuel's removal is unclear, the admission is seen as a major embarrassment for Tehran because it has touted Bushehr -- Iran's first atomic power plant -- as its showcase nuclear facility and sees it as a source of national pride. When the Islamic Republic began loading the fuel just four months ago, Iranian officials celebrated the achievement.

Iran's envoy to the U.N. nuclear monitoring agency in Vienna said that Russia, which provided the fuel and helped construct the Bushehr plant, had demanded the fuel be taken out.

"Upon a demand from Russia, which is responsible for completing the Bushehr nuclear power plant, fuel assemblies from the core of the reactor will be unloaded for a period of time to carry out tests and take technical measurements," the semiofficial ISNA news agency quoted Ali Asghar Soltanieh as saying. "After the tests are conducted, (the fuel) will be placed in the core of the reactor once again."

"Iran always gives priority to the safety of the plant based on highest global standards," Soltanieh added.

Calls to the Russian nuclear agency Rosatom for comment were not answered Saturday afternoon.

The spokesman of the Atomic Energy Organization of Iran said the fuel unloading was nothing unusual.

"It's a kind of technical inspection and to obtain confidence about the safety of the reactor," Hamid Khadem Qaemi told the official IRNA news agency. He accused foreign media of blowing the issue out of proportion.

The Bushehr plant is not among the aspects of Iran's nuclear program that are of top concern to the international community and is not directly subject to sanctions. It has international approval and is supervised by the U.N.'s nuclear monitoring agency, the International Atomic Energy Agency.

In a report released Friday about Iran's nuclear program, the IAEA said that Tehran informed the agency on Wednesday that it would have to unload the fuel rods. The agency said it and Tehran have agreed on the "necessary safeguards measures."

A senior international official familiar with Iran's nuclear program said the IAEA had no further details. He said unloading and reloading fuel assemblies is not unusual before any reactor startup. The official asked for anonymity because his information was confidential.

Soltanieh and other officials have not specified why the fuel had to be unloaded, but Iranian officials denied any link to the Stuxnet computer virus.

"Stuxnet has had no effect on the control systems at the Bushehr nuclear power plant," Nasser Rastkhah, a senior official in charge of nuclear security, told the official IRNA news agency.

Foreign intelligence reports have said the control systems at Bushehr were penetrated by the malware -- malicious software designed to infiltrate computer systems -- but Iran has all along maintained that Stuxnet was only found on several laptops belonging to plant employees and didn't affect the facility's control systems.

Some computer experts believe Stuxnet was the work of Israel or the United States, two nations convinced that Iran wants to turn nuclear fuel into weapons-grade uranium.

The Islamic Republic is reluctant to acknowledge setbacks to its nuclear activities, which it says are aimed at generating energy but are under U.N. sanctions because of concerns they could be channeled toward making weapons. Only after outside revelations that its enrichment program was temporarily disrupted late last year by Stuxnet did Iranian officials acknowledge the incident.

The startup of the Bushehr power plant, a project completed with Russian help but beset by years of delays, would deliver Iran the central stated goal of its atomic work -- the generation of nuclear power.

But the inauguration of the facility has been delayed for years. Iran said when it began inserting the fuel rods in October that the 1,000-megawatt light-water reactor would begin pumping electricity to Iranian cities by December. But it pushed back the timing to February, citing a "small leak" and other unspecified reasons.

The Bushehr plant itself is not among the West's main worries because safeguards are in place to ensure that the spent fuel will be returned to Russia and cannot be diverted to weapons making.

The United States and some of its allies believe the Bushehr plant is part of a civil energy program that Iran is using as cover for a covert programto develop a nuclear weapons capability. Iran denies the accusation.

The Bushehr project dates back to 1974, when Iran's U.S.-backed Shah Mohammed Reza Pahlavi contracted with the German company Siemens to build the reactor. The company withdrew from the project after the 1979 Islamic Revolution toppled the shah and brought hard-line clerics to power.

In 1992, Iran signed a $1 billion deal with Russia to complete the project and work began in 1995.

Under the contract, Bushehr was originally scheduled to come on stream in July 1999 but the startup has been delayed repeatedly by construction and supply glitches.

The mission: Infiltrate the highly advanced, securely guarded enemy headquarters where scientists in the clutches of an evil master are secretly building a weapon that can destroy the world. Then render that weapon harmless and escape undetected.

But in the 21st century, Bond doesn't get the call. Instead, the job is handled by a suave and very sophisticated secret computer worm, a jumble of code called Stuxnet, which in the last year has not only crippled Iran's nuclear program but has caused a major rethinking of computer security around the globe.

Intelligence agencies, computer security companies and the nuclear industry have been trying to analyze the worm since it was discovered in June by a Belarus-based company that was doing business in Iran. And what they've all found, says Sean McGurk, the Homeland Security Department's acting director of national cyber security and communications integration, is a “game changer.”

The construction of the worm was so advanced, it was “like the arrival of an F-35 into a World War I battlefield,” says Ralph Langner, the computer expert who was the first to sound the alarm about Stuxnet. Others have called it the first “weaponized” computer virus.

Simply put, Stuxnet is an incredibly advanced, undetectable computer worm that took years to construct and was designed to jump from computer to computer until it found the specific, protected control system that it aimed to destroy: Iran’s nuclear enrichment program.

The target was seemingly impenetrable; for security reasons, it lay several stories underground and was not connected to the World Wide Web. And that meant Stuxnet had to act as sort of a computer cruise missile: As it made its passage through a set of unconnected computers, it had to grow and adapt to security measures and other changes until it reached one that could bring it into the nuclear facility.

When it ultimately found its target, it would have to secretly manipulate it until it was so compromised it ceased normal functions.

And finally, after the job was done, the worm would have to destroy itself without leaving a trace.

That is what we are learning happened at Iran's nuclear facilities -- both at Natanz, which houses the centrifuge arrays used for processing uranium into nuclear fuel, and, to a lesser extent, at Bushehr, Iran's nuclear power plant.

At Natanz, for almost 17 months, Stuxnet quietly worked its way into the system and targeted a specific component -- the frequency converters made by the German equipment manufacturer Siemens that regulated the speed of the spinning centrifuges used to create nuclear fuel. The worm then took control of the speed at which the centrifuges spun, making them turn so fast in a quick burst that they would be damaged but not destroyed. And at the same time, the worm masked that change in speed from being discovered at the centrifuges' control panel.

At Bushehr, meanwhile, a second secret set of codes, which Langner called “digital warheads,” targeted the Russian-built power plant's massive steam turbine.

Here's how it worked, according to experts who have examined the worm:

--The nuclear facility in Iran runs an “air gap” security system, meaning it has no connections to the Web, making it secure from outside penetration. Stuxnet was designed and sent into the area around Iran's Natanz nuclear power plant -- just how may never be known -- to infect a number of computers on the assumption that someone working in the plant would take work home on a flash drive, acquire the worm and then bring it back to the plant.

--Once the worm was inside the plant, the next step was to get the computer system there to trust it and allow it into the system. That was accomplished because the worm contained a “digital certificate” stolen from JMicron, a large company in an industrial park in Taiwan. (When the worm was later discovered it quickly replaced the original digital certificate with another certificate, also stolen from another company, Realtek, a few doors down in the same industrial park in Taiwan.)

--Once allowed entry, the worm contained four “Zero Day” elements in its first target, the Windows 7 operating system that controlled the overall operation of the plant. Zero Day elements are rare and extremely valuable vulnerabilities in a computer system that can be exploited only once. Two of the vulnerabilities were known, but the other two had never been discovered. Experts say no hacker would waste Zero Days in that manner.

--After penetrating the Windows 7 operating system, the code then targeted the “frequency converters” that ran the centrifuges. To do that it used specifications from the manufacturers of the converters. One was Vacon, a Finnish Company, and the other Fararo Paya, an Iranian company. What surprises experts at this step is that the Iranian company was so secret that not even the IAEA knew about it.

--The worm also knew that the complex control system that ran the centrifuges was built by Siemens, the German manufacturer, and -- remarkably -- how that system worked as well and how to mask its activities from it.

--Masking itself from the plant's security and other systems, the worm then ordered the centrifuges to rotate extremely fast, and then to slow down precipitously. This damaged the converter, the centrifuges and the bearings, and it corrupted the uranium in the tubes. It also left Iranian nuclear engineers wondering what was wrong, as computer checks showed no malfunctions in the operating system.

Estimates are that this went on for more than a year, leaving the Iranian program in chaos. And as it did, the worm grew and adapted throughout the system. As new worms entered the system, they would meet and adapt and become increasingly sophisticated.

During this time the worms reported back to two servers that had to be run by intelligence agencies, one in Denmark and one in Malaysia. The servers monitored the worms and were shut down once the worm had infiltrated Natanz. Efforts to find those servers since then have yielded no results.

This went on until June of last year, when a Belarusan company working on the Iranian power plant in Beshehr discovered it in one of its machines. It quickly put out a notice on a Web network monitored by computer security experts around the world. Ordinarily these experts would immediately begin tracing the worm and dissecting it, looking for clues about its origin and other details.

But that didn’t happen, because within minutes all the alert sites came under attack and were inoperative for 24 hours.

“I had to use e-mail to send notices but I couldn’t reach everyone. Whoever made the worm had a full day to eliminate all traces of the worm that might lead us them,” Eric Byers, a computer security expert who has examined the Stuxnet. “No hacker could have done that.”

Experts, including inspectors from the International Atomic Energy Agency, say that, despite Iran's claims to the contrary, the worm was successful in its goal: causing confusion among Iran’s nuclear engineers and disabling their nuclear program.

Because of the secrecy surrounding the Iranian program, no one can be certain of the full extent of the damage. But sources inside Iran and elsewhere say that the Iranian centrifuge program has been operating far below its capacity and that the uranium enrichment program had “stagnated” during the time the worm penetrated the underground facility. Only 4,000 of the 9,000 centrifuges Iran was known to have were put into use. Some suspect that is because of the critical need to replace ones that were damaged.

And the limited number of those in use dwindled to an estimated 3,700 as problems engulfed their operation. IAEA inspectors say the sabotage better explains the slowness of the program, which they had earlier attributed to poor equipment manufacturing and management problems. As Iranians struggled with the setbacks, they began searching for signs of sabotage. From inside Iran there have been unconfirmed reports that the head of the plant was fired shortly after the worm wended its way into the system and began creating technical problems, and that some scientists who were suspected of espionage disappeared or were executed. And counter intelligence agents began monitoring all communications between scientists at the site, creating a climate of fear and paranoia.

Iran has adamantly stated that its nuclear program has not been hit by the bug. But in doing so it has backhandedly confirmed that its nuclear facilities were compromised. When Hamid Alipour, head of the nation’s Information Technology Company, announced in September that 30,000 Iranian computers had been hit by the worm but the nuclear facilities were safe, he added that among those hit were the personal computers of the scientists at the nuclear facilities. Experts say that Natanz and Bushehr could not have escaped the worm if it was in their engineers’ computers.

“We brought it into our lab to study it and even with precautions it spread everywhere at incredible speed,” Byres said.

“The worm was designed not to destroy the plants but to make them ineffective. By changing the rotation speeds, the bearings quickly wear out and the equipment has to be replaced and repaired. The speed changes also impact the quality of the uranium processed in the centrifuges creating technical problems that make the plant ineffective,” he explained.

In other words the worm was designed to allow the Iranian program to continue but never succeed, and never to know why.

One additional impact that can be attributed to the worm, according to David Albright of the Center for Strategic and International Studies, is that “the lives of the scientists working in the facility have become a living hell because of counter-intelligence agents brought into the plant” to battle the breach. Ironically, even after its discovery, the worm has succeeded in slowing down Iran's reputed effort to build an atomic weapon. And Langer says that the efforts by the Iranians to cleanse Stuxnet from their system “will probably take another year to complete,” and during that time the plant will not be able to function anywhere normally."